SC Videos

SC Videos

Can event-based analytics spot IP developers stealing their own assets?

The most likely person to steal IP is not an external threat, but rather the person who developed it and uses it every day, according to Forcepoint Chief Scientist Dr. Richard Ford. And this insider threat actually may be more difficult to detect because typical event-based security analytics may not always be adequately equipped to…

Perimeter has changed, not disappeared (video)

For all the talk that the perimeter has faded away, Juniper Networks Vice President of Security Business and Strategy Samantha Madrid contends that it has just shifted instead. Madrid also told SC Media Executive Editor Teri Robinson that it’s time for companies bent on security to bust the silo mentality.

Next post in Security News